O'Reilly logo

BackTrack 5 Cookbook by David De Smet, Willie Pritchett

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Cleaning up the tracks

In this recipe we will use Metasploit to erase our tracks. Cleaning up after compromising a host is an extremely important step because you don't want to go through all the trouble of gaining access only to get caught. Luckily for us, Metasploit has a way for us to clean up our tracks very easily.

Getting ready

The following requirements need to be fulfilled:

  • A connection to the Internet or intranet is required to complete this recipe
  • A compromised machine using the Metasploit Framework is also required

How to do it...

Let's begin the process of performing a clean up of our tracks from a Meterpreter shell:

  1. You will have to use Metasploit to attack a host in order to gain a Meterpreter shell. You can use one of the recipes in

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required